Embedded Systems Flashcards
Which of the following statements is not true?
Embedded systems are designed with a single control purpose in mind and typically have no additional functionality.
Embedded systems are free of risk or security concerns.
Embedded is the name given to a computer that is included as an integral part of a larger system.
Embedded systems are free of risk or security concerns.
Embedded systems are not free of risk or security concerns, as hackers have demonstrated
Which of the following is true regarding risk of next-generation vehicles?
There are minimal risks when next-generation automobiles share information.
Passing traffic and other information between vehicles does not increase security risks.
The sharing of navigation and other inputs between vehicles presents a potential security issue.
The sharing of navigation and other inputs between vehicles presents a potential security issue.
The sharing of navigation and other inputs presents a potential security issue for next-generation vehicles. False information when shared can cause problems
Which of the following is true about in-flight networks?
Wi-Fi, in-flight entertainment, and cockpit digital flight control networks are segregated.
Wi-Fi and cockpit digital flight control networks can be integrated without increasing potential security risks.
Wi-Fi, in-flight entertainment, and cockpit digital flight control networks can present potential security risks.
Wi-Fi, in-flight entertainment, and cockpit digital flight control networks can present potential security risks.
Wi-Fi, in-flight entertainment, and cockpit digital flight control networks can present potential security risks
Which of the following is true about static environments?
They are often designed to be fully integrated into a company’s network security strategy.
They are designed to remain unaltered through their lifecycle.
Because they perform a very specific function, they have no need for security updates.
They are designed to remain unaltered through their lifecycle.
Static environments are designed to remain unaltered through their lifecycle
Which of the following is true about building-automation systems, climate control systems, HVAC systems, elevator control systems, and alarm systems?
They are independent and stand-alone systems that offer little integration value.
Interconnecting these systems and adding Internet-based central control mechanisms doesn’t increase the risk profile from outside attacks.
These systems are being integrated to increase efficiency and reduce costs.
These systems are being integrated to increase efficiency and reduce costs.
Building-automation systems, climate control systems, HVAC systems, elevator control systems, and alarm systems are being integrated to increase efficiency and reduce costs
Which of the following properly defines supervisory control and data acquisition (SCADA)?
A scaled-down version of Linux designed for use in an embedded system
The risk created by connecting control systems in buildings
A system designed to control automated systems in cyber-physical environments
A system designed to control automated systems in cyber-physical environments
SCADA is a system designed to control automated systems in cyber-physical environments
Which of the following is true about SCADA systems?
The ongoing integration of SCADA environments has reduced potential risks.
The introduction of human machine interfaces to manage SCADA systems has eliminated potential risks.
The historical isolation of SCADA systems from other systems is decreasing as SCADA systems are being connected across traditional networks to improve business functionality.
The historical isolation of SCADA systems from other systems is decreasing as SCADA systems are being connected across traditional networks to improve business functionality.
Historical isolation of SCADA systems is decreasing as these systems are being connected across traditional networks to improve business functionality
Which of the following is true about smart devices and the Internet of Things (IoT)?
The use of a Linux-type kernel as the core engine makes programming more complex.
Mass production introduces significant security risks.
The scaling of the software development over large numbers of units makes costs scalable, and functionality is paramount.
The scaling of the software development over large numbers of units makes costs scalable, and functionality is paramount.
The scaling of the software development over large numbers of units makes costs scalable, and functionality is paramount in smart devices and IoT
Which of the following is true about home automation devices?
They have been used in botnet exploitations with significant impacts.
They don’t impose significant potential risks as they are isolated on the home network.
Because home automation systems are exploding in use, they have been designed with security in mind from the very beginning.
They have been used in botnet exploitations with significant impacts.
Home automation devices have been used in botnet exploitations with significant impacts
Which of the following is true about HVAC and building automation systems?
They have not been exploited to any significant degree yet.
Interconnecting these systems and using Internet-based central control mechanisms increases the risk profile from outside attacks.
Having a “smart building” that reduces building resources in accordance with the number and distribution of people inside has not increased efficiency or reduced costs.
Interconnecting these systems and using Internet-based central control mechanisms increases the risk profile from outside attacks.
Interconnecting HVAC and building automation systems and using Internet-based central control mechanisms to manage them increases the risk profile from outside attacks
Which of the following is not true about systems on a chip?
They provide the full functionality of a computing platform on a single chip.
Programming of SoC systems can occur at several different levels and thus potential risks are easily mitigated.
Because these devices represent computing platforms with billions of devices worldwide, they have become a significant force in the marketplace.
Programming of SoC systems can occur at several different levels and thus potential risks are easily mitigated.
Programming of SoC systems can occur at several different levels and thus potential risks are difficult to mitigate
What distinguishes real-time operating systems (RTOSs) from general-purpose operating systems?
Unlike RTOSs, most general-purpose operating systems handle interrupts within defined time constraints.
Unlike general-purpose OSs, most RTOSs are capable of multitasking by design.
Unlike RTOSs, most general-purpose operating systems are multitasking by design.
Unlike RTOSs, most general-purpose operating systems are multitasking by design.
One thing that distinguishes real-time operating systems (RTOSs) from general-purpose operating systems is that most general-purpose operating systems are designed for multitasking
Which of the following is true about printers and multifunction devices?
They rely on the computer to manage the printing and scanning processes.
Because of their long history and widespread use, security is designed into these products.
These devices communicate in a bidirectional fashion, accepting print jobs and sending back job status, printer status, and so forth.
These devices communicate in a bidirectional fashion, accepting print jobs and sending back job status, printer status, and so forth.
Printers and multifunction devices communicate in a bidirectional fashion, accepting print jobs and sending back job status, printer status, and so forth
Which of the following is a very important aspect to always remember when dealing with security of medical devices?
They are still relatively new in their usage.
They can directly affect human life.
Security is not related to safety.
They can directly affect human life.
A very important aspect to always remember when dealing with security of medical devices is that they can directly affect human life
hich of the following poses a significant potential risk of unmanned aerial vehicles?
They have cameras, sensors, and payloads.
Low prices for some models.
Because they are pilotless, their remote-control systems may be networked and vulnerable to potential risks.
Because they are pilotless, their remote-control systems may be networked and vulnerable to potential risks.
A significant potential risk of unmanned aerial vehicles is that, because they are pilotless, their remote-control systems may be networked and thus vulnerable to potential risks